{"id":371,"date":"2020-05-19T15:44:47","date_gmt":"2020-05-19T10:14:47","guid":{"rendered":"http:\/\/www.cyberlawcollege.com\/wp\/?p=371"},"modified":"2020-05-28T15:46:41","modified_gmt":"2020-05-28T10:16:41","slug":"course-on-ita-2000-8-and-cyber-jurisprudence","status":"publish","type":"post","link":"http:\/\/www.cyberlawcollege.com\/wp\/?p=371","title":{"rendered":"Course on ITA 2000\/8 and Cyber Jurisprudence"},"content":{"rendered":"<div class=\"pf-content\"><p><a href=\"http:\/\/www.cyberlawcollege.com\/wp\/wp-content\/uploads\/2020\/05\/course2.jpg\"><img loading=\"lazy\" class=\"alignnone size-full wp-image-385\" src=\"http:\/\/www.cyberlawcollege.com\/wp\/wp-content\/uploads\/2020\/05\/course2.jpg\" alt=\"\" width=\"622\" height=\"473\" srcset=\"http:\/\/www.cyberlawcollege.com\/wp\/wp-content\/uploads\/2020\/05\/course2.jpg 622w, http:\/\/www.cyberlawcollege.com\/wp\/wp-content\/uploads\/2020\/05\/course2-300x228.jpg 300w\" sizes=\"(max-width: 622px) 100vw, 622px\" \/><\/a><\/p>\n<hr \/>\n<p><a href=\"http:\/\/www.cyberlawcollege.com\/wp\/wp-content\/uploads\/2020\/05\/cl_course_25th_may-2.png\"><img loading=\"lazy\" class=\"wp-image-377 aligncenter\" src=\"http:\/\/www.cyberlawcollege.com\/wp\/wp-content\/uploads\/2020\/05\/cl_course_25th_may-2.png\" alt=\"\" width=\"505\" height=\"283\" srcset=\"http:\/\/www.cyberlawcollege.com\/wp\/wp-content\/uploads\/2020\/05\/cl_course_25th_may-2.png 660w, http:\/\/www.cyberlawcollege.com\/wp\/wp-content\/uploads\/2020\/05\/cl_course_25th_may-2-300x168.png 300w\" sizes=\"(max-width: 505px) 100vw, 505px\" \/><\/a><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\">Program conducted over interactive online session. Covers entire Information Technology Act along with the Cyber Jurisprudential analysis of the law, including Digital Signatures, Section 65B of Indian Evidence Act and Legal aspects of Information Security, Cyber Crimes in E Banking, E Commerce scenario etc<\/span><span style=\"color: #000000;\">\u00a0on<\/span><\/p>\n<h3 style=\"text-align: center;\"><strong>REGISTRATION CLOSED<\/strong><\/h3>\n<h3>All participants would be issued participation certificate from Cyber Law College<\/h3>\n<h3>Also see: <strong><a href=\"https:\/\/www.naavi.org\/wp\/back-to-teaching-ita-2000-with-a-cyber-jurisprudence-perspective\/\" target=\"_blank\" rel=\"noopener noreferrer\">Back to Teaching ITA 2000 with a Cyber Jurisprudence perspective<\/a><\/strong><\/h3>\n<div style=\"padding-bottom:20px; padding-top:10px;\" class=\"hupso-share-buttons\"><!-- Hupso Share Buttons - https:\/\/www.hupso.com\/share\/ --><a class=\"hupso_toolbar\" href=\"https:\/\/www.hupso.com\/share\/\"><img src=\"http:\/\/static.hupso.com\/share\/buttons\/share-medium.png\" style=\"border:0px; padding-top:5px; float:left;\" alt=\"Share Button\"\/><\/a><script type=\"text\/javascript\">var hupso_services_t=new Array(\"Twitter\",\"Facebook\",\"Google Plus\",\"Pinterest\",\"Linkedin\");var hupso_background_t=\"#EAF4FF\";var hupso_border_t=\"#66CCFF\";var hupso_toolbar_size_t=\"medium\";var hupso_twitter_via = \"naavi\";var hupso_image_folder_url = \"\";var hupso_twitter_via=\"naavi\";var hupso_url_t=\"\";var hupso_title_t=\"Course on ITA 2000\/8 and Cyber Jurisprudence\";<\/script><script type=\"text\/javascript\" src=\"http:\/\/static.hupso.com\/share\/js\/share_toolbar.js\"><\/script><!-- Hupso Share Buttons --><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Program conducted over interactive online session. Covers entire Information Technology Act along with the Cyber Jurisprudential analysis of the law, including Digital Signatures, Section 65B of Indian Evidence Act and Legal aspects of Information Security, Cyber Crimes in E Banking, &hellip; <a href=\"http:\/\/www.cyberlawcollege.com\/wp\/?p=371\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n<div style=\"padding-bottom:20px; padding-top:10px;\" class=\"hupso-share-buttons\"><!-- Hupso Share Buttons - https:\/\/www.hupso.com\/share\/ --><a class=\"hupso_toolbar\" href=\"https:\/\/www.hupso.com\/share\/\"><img src=\"http:\/\/static.hupso.com\/share\/buttons\/share-medium.png\" style=\"border:0px; padding-top:5px; float:left;\" alt=\"Share Button\"\/><\/a><script type=\"text\/javascript\">var hupso_services_t=new Array(\"Twitter\",\"Facebook\",\"Google Plus\",\"Pinterest\",\"Linkedin\");var hupso_background_t=\"#EAF4FF\";var hupso_border_t=\"#66CCFF\";var hupso_toolbar_size_t=\"medium\";var hupso_twitter_via = \"naavi\";var hupso_image_folder_url = \"\";var hupso_twitter_via=\"naavi\";var hupso_url_t=\"\";var hupso_title_t=\"Course on ITA 2000\/8 and Cyber Jurisprudence\";<\/script><script type=\"text\/javascript\" src=\"http:\/\/static.hupso.com\/share\/js\/share_toolbar.js\"><\/script><!-- Hupso Share Buttons --><\/div>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_editorskit_title_hidden":false,"_editorskit_reading_time":0,"_editorskit_is_block_options_detached":false,"_editorskit_block_options_position":"{}","_themeisle_gutenberg_block_has_review":false,"spay_email":"","jetpack_publicize_message":""},"categories":[1],"tags":[],"jetpack_featured_media_url":"","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p3NjGu-5Z","_links":{"self":[{"href":"http:\/\/www.cyberlawcollege.com\/wp\/index.php?rest_route=\/wp\/v2\/posts\/371"}],"collection":[{"href":"http:\/\/www.cyberlawcollege.com\/wp\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.cyberlawcollege.com\/wp\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.cyberlawcollege.com\/wp\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.cyberlawcollege.com\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=371"}],"version-history":[{"count":9,"href":"http:\/\/www.cyberlawcollege.com\/wp\/index.php?rest_route=\/wp\/v2\/posts\/371\/revisions"}],"predecessor-version":[{"id":386,"href":"http:\/\/www.cyberlawcollege.com\/wp\/index.php?rest_route=\/wp\/v2\/posts\/371\/revisions\/386"}],"wp:attachment":[{"href":"http:\/\/www.cyberlawcollege.com\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=371"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.cyberlawcollege.com\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=371"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.cyberlawcollege.com\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=371"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}